全文获取类型
收费全文 | 142286篇 |
免费 | 15104篇 |
国内免费 | 10009篇 |
专业分类
电工技术 | 11035篇 |
技术理论 | 2篇 |
综合类 | 12435篇 |
化学工业 | 19455篇 |
金属工艺 | 9419篇 |
机械仪表 | 9771篇 |
建筑科学 | 10665篇 |
矿业工程 | 5168篇 |
能源动力 | 3608篇 |
轻工业 | 12645篇 |
水利工程 | 4141篇 |
石油天然气 | 6910篇 |
武器工业 | 1674篇 |
无线电 | 16246篇 |
一般工业技术 | 14396篇 |
冶金工业 | 7198篇 |
原子能技术 | 2244篇 |
自动化技术 | 20387篇 |
出版年
2024年 | 888篇 |
2023年 | 2428篇 |
2022年 | 5048篇 |
2021年 | 6676篇 |
2020年 | 4853篇 |
2019年 | 3794篇 |
2018年 | 4051篇 |
2017年 | 4642篇 |
2016年 | 4100篇 |
2015年 | 5988篇 |
2014年 | 7384篇 |
2013年 | 8813篇 |
2012年 | 10581篇 |
2011年 | 11318篇 |
2010年 | 10452篇 |
2009年 | 9687篇 |
2008年 | 9941篇 |
2007年 | 9553篇 |
2006年 | 9042篇 |
2005年 | 7373篇 |
2004年 | 5171篇 |
2003年 | 3859篇 |
2002年 | 3567篇 |
2001年 | 3216篇 |
2000年 | 2943篇 |
1999年 | 2226篇 |
1998年 | 1887篇 |
1997年 | 1479篇 |
1996年 | 1305篇 |
1995年 | 1068篇 |
1994年 | 923篇 |
1993年 | 668篇 |
1992年 | 480篇 |
1991年 | 412篇 |
1990年 | 312篇 |
1989年 | 281篇 |
1988年 | 211篇 |
1987年 | 144篇 |
1986年 | 121篇 |
1985年 | 76篇 |
1984年 | 35篇 |
1983年 | 28篇 |
1982年 | 39篇 |
1981年 | 37篇 |
1980年 | 48篇 |
1979年 | 27篇 |
1977年 | 48篇 |
1976年 | 95篇 |
1959年 | 14篇 |
1951年 | 18篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
92.
在多种类病毒的相互作用下,网络信道破坏程度呈现较强的非线性特点,不能准确约束病毒在相互作用下的破坏性.传统的网络破坏程度估计的过程中,仅仅以单一病毒破坏程度叠加的方式去计算参数,计算具有较强的主观性,没有准确描述不同病毒的破坏作用,对评估结果误差影响较大.为解决上述问题,提出一种基于粒子滤波算法的多种类病毒相互作用下网络信道破坏程度估计方法,利用欧式距离方法对全部病毒进行分类,获取不同类型病毒的网络信道破坏程度值.通过粒子滤波算法对单一个体约束的优势,将每一个不同类型的病毒看作一个粒子,并进行训练.根据训练结果,利用粒子滤波算法对当前时刻网络信道破坏程度进行估计,完成整体评估.实验结果表明,利用改进算法进行多种类病毒相互作用下网络信道破坏程度估计,能够有效提高估计的准确率. 相似文献
93.
Qian?LiEmail author Wenjia?Niu Gang?Li Endong?Tong Yue?Hu Ping?Liu Li?Guo 《Journal of Network and Systems Management》2015,23(3):474-501
With the motivation of seamlessly extending wireless sensor networks to the external environment, service-oriented architecture comes up as a promising solution. However, as sensor nodes are failure prone, this consequently renders the whole wireless sensor network to seriously faulty. When a particular node is faulty, the service on it should be migrated into those substitute sensor nodes that are in a normal status. Currently, two kinds of approaches exist to identify the substitute sensor nodes: the most common approach is to prepare redundancy nodes, though the involved tasks such as maintaining redundancy nodes, i.e., relocating the new node, lead to an extra burden on the wireless sensor networks. More recently, other approaches without using redundancy nodes are emerging, and they merely select the substitute nodes in a sensor node’s perspective i.e., migrating the service of faulty node to it’s nearest sensor node, though usually neglecting the requirements of the application level. Even a few work consider the need of the application level, they perform at packets granularity and don’t fit well at service granularity. In this paper, we aim to remove these limitations in the wireless sensor network with the service-oriented architecture. Instead of deploying redundancy nodes, the proposed mechanism replaces the faulty sensor node with consideration of the similarity on the application level, as well as on the sensor level. On the application level, we apply the Bloom Filter for its high efficiency and low space costs. While on the sensor level, we design an objective solution via the coefficient of a variation as an evaluation for choosing the substitute on the sensor level. 相似文献
94.
95.
96.
97.
98.
随着信息化技术的加速发展,数字化校园建设势必导致服务器数量的不断增加,给管理带来了巨大挑战.本文研究了服务器虚拟化部署方案,并将江西财经大学选课系统的WEB应用从实体服务器迁移到虚拟机上,通过对虚拟机和实体机的性能监测对比分析,发现虚拟机具有很强的替代性和推广型,为今后基于虚拟机技术构建数字化校园服务平台提供了可参考的实践依据. 相似文献
99.
Backlash-like hysteresis is one of the nonsmooth and multi-valued nonlinearities usually existing in mechanical systems. The traditional identification method is quite difficult to be used to model the systems involved with such complex nonlinearities. In this paper, a nonsmooth recursive identification algorithm for the systems with backlash-like hysteresis is proposed. In this method, the concept of Clarke subgradient is introduced to approximate the gradients at nonsmooth points and the so-called bundle method is used to obtain the optimization search direction in nonsmooth cases. Then, a recursive algorithm based on the idea of bundle method is developed for parameter estimation. After that, the convergence analysis of the algorithm is investigated. Finally, simulation results to validate the proposed method on a simulated mechanical transmission system are presented. 相似文献
100.
An appropriate assessment of end-to-end network performance presumes highly efficient time tracking and measurement with precise time control of the stopping and resuming of program operation. In this paper, a novel approach to solving the problems of highly efficient and precise time measurements on PC-platforms and on ARM-architectures is proposed. A new unified High Performance Timer and a corresponding software library offer a unified interface to the known time counters and automatically identify the fastest and most reliable time source, available in the user space of a computing system. The research is focused on developing an approach of unified time acquisition from the PC hardware and accordingly substituting the common way of getting the time value through Linux system calls. The presented approach provides a much faster means of obtaining the time values with a nanosecond precision than by using conventional means. Moreover, it is capable of handling the sequential time value, precise sleep functions and process resuming. This ability means the reduction of wasting computer resources during the execution of a sleeping process from 100% (busy-wait) to 1-1.5%, whereas the benefits of very accurate process resuming times on long waits are maintained. 相似文献